1 /* crypto/cryptlib.c */ 2 /* ==================================================================== 3 * Copyright (c) 1998-2006 The OpenSSL Project. All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions 7 * are met: 8 * 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 12 * 2. Redistributions in binary form must reproduce the above copyright 13 * notice, this list of conditions and the following disclaimer in 14 * the documentation and/or other materials provided with the 15 * distribution. 16 * 17 * 3. All advertising materials mentioning features or use of this 18 * software must display the following acknowledgment: 19 * "This product includes software developed by the OpenSSL Project 20 * for use in the OpenSSL Toolkit. (http://www.openssl.org/)" 21 * 22 * 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to 23 * endorse or promote products derived from this software without 24 * prior written permission. For written permission, please contact 25 * openssl-core@openssl.org. 26 * 27 * 5. Products derived from this software may not be called "OpenSSL" 28 * nor may "OpenSSL" appear in their names without prior written 29 * permission of the OpenSSL Project. 30 * 31 * 6. Redistributions of any form whatsoever must retain the following 32 * acknowledgment: 33 * "This product includes software developed by the OpenSSL Project 34 * for use in the OpenSSL Toolkit (http://www.openssl.org/)" 35 * 36 * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY 37 * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 38 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 39 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR 40 * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 41 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 42 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 43 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 44 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, 45 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 46 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 47 * OF THE POSSIBILITY OF SUCH DAMAGE. 48 * ==================================================================== 49 * 50 * This product includes cryptographic software written by Eric Young 51 * (eay@cryptsoft.com). This product includes software written by Tim 52 * Hudson (tjh@cryptsoft.com). 53 * 54 */ 55 /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) 56 * All rights reserved. 57 * 58 * This package is an SSL implementation written 59 * by Eric Young (eay@cryptsoft.com). 60 * The implementation was written so as to conform with Netscapes SSL. 61 * 62 * This library is free for commercial and non-commercial use as long as 63 * the following conditions are aheared to. The following conditions 64 * apply to all code found in this distribution, be it the RC4, RSA, 65 * lhash, DES, etc., code; not just the SSL code. The SSL documentation 66 * included with this distribution is covered by the same copyright terms 67 * except that the holder is Tim Hudson (tjh@cryptsoft.com). 68 * 69 * Copyright remains Eric Young's, and as such any Copyright notices in 70 * the code are not to be removed. 71 * If this package is used in a product, Eric Young should be given attribution 72 * as the author of the parts of the library used. 73 * This can be in the form of a textual message at program startup or 74 * in documentation (online or textual) provided with the package. 75 * 76 * Redistribution and use in source and binary forms, with or without 77 * modification, are permitted provided that the following conditions 78 * are met: 79 * 1. Redistributions of source code must retain the copyright 80 * notice, this list of conditions and the following disclaimer. 81 * 2. Redistributions in binary form must reproduce the above copyright 82 * notice, this list of conditions and the following disclaimer in the 83 * documentation and/or other materials provided with the distribution. 84 * 3. All advertising materials mentioning features or use of this software 85 * must display the following acknowledgement: 86 * "This product includes cryptographic software written by 87 * Eric Young (eay@cryptsoft.com)" 88 * The word 'cryptographic' can be left out if the rouines from the library 89 * being used are not cryptographic related :-). 90 * 4. If you include any Windows specific code (or a derivative thereof) from 91 * the apps directory (application code) you must include an acknowledgement: 92 * "This product includes software written by Tim Hudson (tjh@cryptsoft.com)" 93 * 94 * THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND 95 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 96 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 97 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 98 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 99 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 100 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 101 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 102 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 103 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 104 * SUCH DAMAGE. 105 * 106 * The licence and distribution terms for any publically available version or 107 * derivative of this code cannot be changed. i.e. this code cannot simply be 108 * copied and put under another distribution licence 109 * [including the GNU Public Licence.] 110 */ 111 /* ==================================================================== 112 * Copyright 2002 Sun Microsystems, Inc. ALL RIGHTS RESERVED. 113 * ECDH support in OpenSSL originally developed by 114 * SUN MICROSYSTEMS, INC., and contributed to the OpenSSL project. 115 */ 116 117 #include "cryptlib.h" 118 #include <openssl/safestack.h> 119 #include <pthread.h> 120 121 #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16) 122 static double SSLeay_MSVC5_hack=0.0; /* and for VC1.5 */ 123 #endif 124 125 DECLARE_STACK_OF(CRYPTO_dynlock) 126 127 /* real #defines in crypto.h, keep these upto date */ 128 static const char* const lock_names[CRYPTO_NUM_LOCKS] = 129 { 130 "<<ERROR>>", 131 "err", 132 "ex_data", 133 "x509", 134 "x509_info", 135 "x509_pkey", 136 "x509_crl", 137 "x509_req", 138 "dsa", 139 "rsa", 140 "evp_pkey", 141 "x509_store", 142 "ssl_ctx", 143 "ssl_cert", 144 "ssl_session", 145 "ssl_sess_cert", 146 "ssl", 147 "ssl_method", 148 "rand", 149 "rand2", 150 "debug_malloc", 151 "BIO", 152 "gethostbyname", 153 "getservbyname", 154 "readdir", 155 "RSA_blinding", 156 "dh", 157 "debug_malloc2", 158 "dso", 159 "dynlock", 160 "engine", 161 "ui", 162 "ecdsa", 163 "ec", 164 "ecdh", 165 "bn", 166 "ec_pre_comp", 167 "store", 168 "comp", 169 "fips", 170 "fips2", 171 #if CRYPTO_NUM_LOCKS != 41 172 # error "Inconsistency between crypto.h and cryptlib.c" 173 #endif 174 }; 175 176 /* This is for applications to allocate new type names in the non-dynamic 177 array of lock names. These are numbered with positive numbers. */ 178 static STACK_OF(OPENSSL_STRING) *app_locks=NULL; 179 180 /* For applications that want a more dynamic way of handling threads, the 181 following stack is used. These are externally numbered with negative 182 numbers. */ 183 static STACK_OF(CRYPTO_dynlock) *dyn_locks=NULL; 184 185 static pthread_mutex_t *solaris_openssl_locks; 186 187 static void (MS_FAR *locking_callback)(int mode,int type, 188 const char *file,int line)=0; 189 static int (MS_FAR *add_lock_callback)(int *pointer,int amount, 190 int type,const char *file,int line)=0; 191 #ifndef OPENSSL_NO_DEPRECATED 192 static unsigned long (MS_FAR *id_callback)(void)=0; 193 #endif 194 static void (MS_FAR *threadid_callback)(CRYPTO_THREADID *)=0; 195 static struct CRYPTO_dynlock_value *(MS_FAR *dynlock_create_callback) 196 (const char *file,int line)=0; 197 static void (MS_FAR *dynlock_lock_callback)(int mode, 198 struct CRYPTO_dynlock_value *l, const char *file,int line)=0; 199 static void (MS_FAR *dynlock_destroy_callback)(struct CRYPTO_dynlock_value *l, 200 const char *file,int line)=0; 201 202 int CRYPTO_get_new_lockid(char *name) 203 { 204 char *str; 205 int i; 206 207 #if defined(OPENSSL_SYS_WIN32) || defined(OPENSSL_SYS_WIN16) 208 /* A hack to make Visual C++ 5.0 work correctly when linking as 209 * a DLL using /MT. Without this, the application cannot use 210 * any floating point printf's. 211 * It also seems to be needed for Visual C 1.5 (win16) */ 212 SSLeay_MSVC5_hack=(double)name[0]*(double)name[1]; 213 #endif 214 215 if ((app_locks == NULL) && ((app_locks=sk_OPENSSL_STRING_new_null()) == NULL)) 216 { 217 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_LOCKID,ERR_R_MALLOC_FAILURE); 218 return(0); 219 } 220 if ((str=BUF_strdup(name)) == NULL) 221 { 222 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_LOCKID,ERR_R_MALLOC_FAILURE); 223 return(0); 224 } 225 i=sk_OPENSSL_STRING_push(app_locks,str); 226 if (!i) 227 OPENSSL_free(str); 228 else 229 i+=CRYPTO_NUM_LOCKS; /* gap of one :-) */ 230 return(i); 231 } 232 233 int CRYPTO_num_locks(void) 234 { 235 return CRYPTO_NUM_LOCKS; 236 } 237 238 int CRYPTO_get_new_dynlockid(void) 239 { 240 int i = 0; 241 CRYPTO_dynlock *pointer = NULL; 242 243 if (dynlock_create_callback == NULL) 244 { 245 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,CRYPTO_R_NO_DYNLOCK_CREATE_CALLBACK); 246 return(0); 247 } 248 CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); 249 if ((dyn_locks == NULL) 250 && ((dyn_locks=sk_CRYPTO_dynlock_new_null()) == NULL)) 251 { 252 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); 253 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE); 254 return(0); 255 } 256 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); 257 258 pointer = (CRYPTO_dynlock *)OPENSSL_malloc(sizeof(CRYPTO_dynlock)); 259 if (pointer == NULL) 260 { 261 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE); 262 return(0); 263 } 264 pointer->references = 1; 265 pointer->data = dynlock_create_callback(__FILE__,__LINE__); 266 if (pointer->data == NULL) 267 { 268 OPENSSL_free(pointer); 269 CRYPTOerr(CRYPTO_F_CRYPTO_GET_NEW_DYNLOCKID,ERR_R_MALLOC_FAILURE); 270 return(0); 271 } 272 273 CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); 274 /* First, try to find an existing empty slot */ 275 i=sk_CRYPTO_dynlock_find(dyn_locks,NULL); 276 /* If there was none, push, thereby creating a new one */ 277 if (i == -1) 278 /* Since sk_push() returns the number of items on the 279 stack, not the location of the pushed item, we need 280 to transform the returned number into a position, 281 by decreasing it. */ 282 i=sk_CRYPTO_dynlock_push(dyn_locks,pointer) - 1; 283 else 284 /* If we found a place with a NULL pointer, put our pointer 285 in it. */ 286 (void)sk_CRYPTO_dynlock_set(dyn_locks,i,pointer); 287 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); 288 289 if (i == -1) 290 { 291 dynlock_destroy_callback(pointer->data,__FILE__,__LINE__); 292 OPENSSL_free(pointer); 293 } 294 else 295 i += 1; /* to avoid 0 */ 296 return -i; 297 } 298 299 void CRYPTO_destroy_dynlockid(int i) 300 { 301 CRYPTO_dynlock *pointer = NULL; 302 if (i) 303 i = -i-1; 304 if (dynlock_destroy_callback == NULL) 305 return; 306 307 CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); 308 309 if (dyn_locks == NULL || i >= sk_CRYPTO_dynlock_num(dyn_locks)) 310 { 311 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); 312 return; 313 } 314 pointer = sk_CRYPTO_dynlock_value(dyn_locks, i); 315 if (pointer != NULL) 316 { 317 --pointer->references; 318 #ifdef REF_CHECK 319 if (pointer->references < 0) 320 { 321 fprintf(stderr,"CRYPTO_destroy_dynlockid, bad reference count\n"); 322 abort(); 323 } 324 else 325 #endif 326 if (pointer->references <= 0) 327 { 328 (void)sk_CRYPTO_dynlock_set(dyn_locks, i, NULL); 329 } 330 else 331 pointer = NULL; 332 } 333 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); 334 335 if (pointer) 336 { 337 dynlock_destroy_callback(pointer->data,__FILE__,__LINE__); 338 OPENSSL_free(pointer); 339 } 340 } 341 342 struct CRYPTO_dynlock_value *CRYPTO_get_dynlock_value(int i) 343 { 344 CRYPTO_dynlock *pointer = NULL; 345 if (i) 346 i = -i-1; 347 348 CRYPTO_w_lock(CRYPTO_LOCK_DYNLOCK); 349 350 if (dyn_locks != NULL && i < sk_CRYPTO_dynlock_num(dyn_locks)) 351 pointer = sk_CRYPTO_dynlock_value(dyn_locks, i); 352 if (pointer) 353 pointer->references++; 354 355 CRYPTO_w_unlock(CRYPTO_LOCK_DYNLOCK); 356 357 if (pointer) 358 return pointer->data; 359 return NULL; 360 } 361 362 struct CRYPTO_dynlock_value *(*CRYPTO_get_dynlock_create_callback(void)) 363 (const char *file,int line) 364 { 365 return(dynlock_create_callback); 366 } 367 368 void (*CRYPTO_get_dynlock_lock_callback(void))(int mode, 369 struct CRYPTO_dynlock_value *l, const char *file,int line) 370 { 371 return(dynlock_lock_callback); 372 } 373 374 void (*CRYPTO_get_dynlock_destroy_callback(void)) 375 (struct CRYPTO_dynlock_value *l, const char *file,int line) 376 { 377 return(dynlock_destroy_callback); 378 } 379 380 void CRYPTO_set_dynlock_create_callback(struct CRYPTO_dynlock_value *(*func) 381 (const char *file, int line)) 382 { 383 dynlock_create_callback=func; 384 } 385 386 void CRYPTO_set_dynlock_lock_callback(void (*func)(int mode, 387 struct CRYPTO_dynlock_value *l, const char *file, int line)) 388 { 389 dynlock_lock_callback=func; 390 } 391 392 void CRYPTO_set_dynlock_destroy_callback(void (*func) 393 (struct CRYPTO_dynlock_value *l, const char *file, int line)) 394 { 395 dynlock_destroy_callback=func; 396 } 397 398 399 void (*CRYPTO_get_locking_callback(void))(int mode,int type,const char *file, 400 int line) 401 { 402 return(locking_callback); 403 } 404 405 int (*CRYPTO_get_add_lock_callback(void))(int *num,int mount,int type, 406 const char *file,int line) 407 { 408 return(add_lock_callback); 409 } 410 411 /* 412 * This is the locking callback function which all applications will be 413 * using when CRYPTO_lock() is called. 414 */ 415 static void solaris_locking_callback(int mode, int type, const char *file, 416 int line) 417 { 418 if (mode & CRYPTO_LOCK) 419 { 420 pthread_mutex_lock(&solaris_openssl_locks[type]); 421 } 422 else 423 { 424 pthread_mutex_unlock(&solaris_openssl_locks[type]); 425 } 426 } 427 428 429 /* 430 * This function is called when a child process is forked to setup its own 431 * global locking callback function ptr and mutexes. 432 */ 433 static void solaris_fork_child(void) 434 { 435 /* 436 * clear locking_callback to indicate that locks should 437 * be reinitialized. 438 */ 439 locking_callback = NULL; 440 solaris_locking_setup(); 441 } 442 443 /* 444 * This function allocates and initializes the global mutex array, and 445 * sets the locking callback. 446 */ 447 void solaris_locking_setup() 448 { 449 int i; 450 int num_locks; 451 452 /* locking callback is already setup. Nothing to do */ 453 if (locking_callback != NULL) 454 { 455 return; 456 } 457 458 /* 459 * Set atfork handler so that child can setup its own mutexes and 460 * locking callbacks when it is forked 461 */ 462 (void) pthread_atfork(NULL, NULL, solaris_fork_child); 463 464 /* allocate locks needed by OpenSSL */ 465 num_locks = CRYPTO_num_locks(); 466 solaris_openssl_locks = 467 OPENSSL_malloc(sizeof (pthread_mutex_t) * num_locks); 468 if (solaris_openssl_locks == NULL) 469 { 470 fprintf(stderr, 471 "solaris_locking_setup: memory allocation failure.\n"); 472 abort(); 473 } 474 475 /* initialize openssl mutexes */ 476 for (i = 0; i < num_locks; i++) 477 { 478 pthread_mutex_init(&solaris_openssl_locks[i], NULL); 479 } 480 locking_callback = solaris_locking_callback; 481 482 } 483 484 void CRYPTO_set_locking_callback(void (*func)(int mode,int type, 485 const char *file,int line)) 486 { 487 /* Calling this here ensures initialisation before any threads 488 * are started. 489 */ 490 OPENSSL_init(); 491 492 /* 493 * we now setup our own locking callback and mutexes, and disallow 494 * setting of another locking callback. 495 */ 496 } 497 498 void CRYPTO_set_add_lock_callback(int (*func)(int *num,int mount,int type, 499 const char *file,int line)) 500 { 501 add_lock_callback=func; 502 } 503 504 /* the memset() here and in set_pointer() seem overkill, but for the sake of 505 * CRYPTO_THREADID_cmp() this avoids any platform silliness that might cause two 506 * "equal" THREADID structs to not be memcmp()-identical. */ 507 void CRYPTO_THREADID_set_numeric(CRYPTO_THREADID *id, unsigned long val) 508 { 509 memset(id, 0, sizeof(*id)); 510 id->val = val; 511 } 512 513 static const unsigned char hash_coeffs[] = { 3, 5, 7, 11, 13, 17, 19, 23 }; 514 void CRYPTO_THREADID_set_pointer(CRYPTO_THREADID *id, void *ptr) 515 { 516 unsigned char *dest = (void *)&id->val; 517 unsigned int accum = 0; 518 unsigned char dnum = sizeof(id->val); 519 520 memset(id, 0, sizeof(*id)); 521 id->ptr = ptr; 522 if (sizeof(id->val) >= sizeof(id->ptr)) 523 { 524 /* 'ptr' can be embedded in 'val' without loss of uniqueness */ 525 id->val = (unsigned long)id->ptr; 526 return; 527 } 528 /* hash ptr ==> val. Each byte of 'val' gets the mod-256 total of a 529 * linear function over the bytes in 'ptr', the co-efficients of which 530 * are a sequence of low-primes (hash_coeffs is an 8-element cycle) - 531 * the starting prime for the sequence varies for each byte of 'val' 532 * (unique polynomials unless pointers are >64-bit). For added spice, 533 * the totals accumulate rather than restarting from zero, and the index 534 * of the 'val' byte is added each time (position dependence). If I was 535 * a black-belt, I'd scan big-endian pointers in reverse to give 536 * low-order bits more play, but this isn't crypto and I'd prefer nobody 537 * mistake it as such. Plus I'm lazy. */ 538 while (dnum--) 539 { 540 const unsigned char *src = (void *)&id->ptr; 541 unsigned char snum = sizeof(id->ptr); 542 while (snum--) 543 accum += *(src++) * hash_coeffs[(snum + dnum) & 7]; 544 accum += dnum; 545 *(dest++) = accum & 255; 546 } 547 } 548 549 int CRYPTO_THREADID_set_callback(void (*func)(CRYPTO_THREADID *)) 550 { 551 if (threadid_callback) 552 return 0; 553 threadid_callback = func; 554 return 1; 555 } 556 557 void (*CRYPTO_THREADID_get_callback(void))(CRYPTO_THREADID *) 558 { 559 return threadid_callback; 560 } 561 562 void CRYPTO_THREADID_current(CRYPTO_THREADID *id) 563 { 564 if (threadid_callback) 565 { 566 threadid_callback(id); 567 return; 568 } 569 #ifndef OPENSSL_NO_DEPRECATED 570 /* If the deprecated callback was set, fall back to that */ 571 if (id_callback) 572 { 573 CRYPTO_THREADID_set_numeric(id, id_callback()); 574 return; 575 } 576 #endif 577 /* Else pick a backup */ 578 #ifdef OPENSSL_SYS_WIN16 579 CRYPTO_THREADID_set_numeric(id, (unsigned long)GetCurrentTask()); 580 #elif defined(OPENSSL_SYS_WIN32) 581 CRYPTO_THREADID_set_numeric(id, (unsigned long)GetCurrentThreadId()); 582 #elif defined(OPENSSL_SYS_BEOS) 583 CRYPTO_THREADID_set_numeric(id, (unsigned long)find_thread(NULL)); 584 #else 585 /* For everything else, default to using the address of 'errno' */ 586 CRYPTO_THREADID_set_pointer(id, (void*)&errno); 587 #endif 588 } 589 590 int CRYPTO_THREADID_cmp(const CRYPTO_THREADID *a, const CRYPTO_THREADID *b) 591 { 592 return memcmp(a, b, sizeof(*a)); 593 } 594 595 void CRYPTO_THREADID_cpy(CRYPTO_THREADID *dest, const CRYPTO_THREADID *src) 596 { 597 memcpy(dest, src, sizeof(*src)); 598 } 599 600 unsigned long CRYPTO_THREADID_hash(const CRYPTO_THREADID *id) 601 { 602 return id->val; 603 } 604 605 #ifndef OPENSSL_NO_DEPRECATED 606 unsigned long (*CRYPTO_get_id_callback(void))(void) 607 { 608 return(id_callback); 609 } 610 611 void CRYPTO_set_id_callback(unsigned long (*func)(void)) 612 { 613 id_callback=func; 614 } 615 616 unsigned long CRYPTO_thread_id(void) 617 { 618 unsigned long ret=0; 619 620 if (id_callback == NULL) 621 { 622 #ifdef OPENSSL_SYS_WIN16 623 ret=(unsigned long)GetCurrentTask(); 624 #elif defined(OPENSSL_SYS_WIN32) 625 ret=(unsigned long)GetCurrentThreadId(); 626 #elif defined(GETPID_IS_MEANINGLESS) 627 ret=1L; 628 #elif defined(OPENSSL_SYS_BEOS) 629 ret=(unsigned long)find_thread(NULL); 630 #else 631 ret=(unsigned long)getpid(); 632 #endif 633 } 634 else 635 ret=id_callback(); 636 return(ret); 637 } 638 #endif 639 640 void CRYPTO_lock(int mode, int type, const char *file, int line) 641 { 642 #ifdef LOCK_DEBUG 643 { 644 CRYPTO_THREADID id; 645 char *rw_text,*operation_text; 646 647 if (mode & CRYPTO_LOCK) 648 operation_text="lock "; 649 else if (mode & CRYPTO_UNLOCK) 650 operation_text="unlock"; 651 else 652 operation_text="ERROR "; 653 654 if (mode & CRYPTO_READ) 655 rw_text="r"; 656 else if (mode & CRYPTO_WRITE) 657 rw_text="w"; 658 else 659 rw_text="ERROR"; 660 661 CRYPTO_THREADID_current(&id); 662 fprintf(stderr,"lock:%08lx:(%s)%s %-18s %s:%d\n", 663 CRYPTO_THREADID_hash(&id), rw_text, operation_text, 664 CRYPTO_get_lock_name(type), file, line); 665 } 666 #endif 667 if (type < 0) 668 { 669 if (dynlock_lock_callback != NULL) 670 { 671 struct CRYPTO_dynlock_value *pointer 672 = CRYPTO_get_dynlock_value(type); 673 674 OPENSSL_assert(pointer != NULL); 675 676 dynlock_lock_callback(mode, pointer, file, line); 677 678 CRYPTO_destroy_dynlockid(type); 679 } 680 } 681 else 682 if (locking_callback != NULL) 683 locking_callback(mode,type,file,line); 684 } 685 686 int CRYPTO_add_lock(int *pointer, int amount, int type, const char *file, 687 int line) 688 { 689 int ret = 0; 690 691 if (add_lock_callback != NULL) 692 { 693 #ifdef LOCK_DEBUG 694 int before= *pointer; 695 #endif 696 697 ret=add_lock_callback(pointer,amount,type,file,line); 698 #ifdef LOCK_DEBUG 699 { 700 CRYPTO_THREADID id; 701 CRYPTO_THREADID_current(&id); 702 fprintf(stderr,"ladd:%08lx:%2d+%2d->%2d %-18s %s:%d\n", 703 CRYPTO_THREADID_hash(&id), before,amount,ret, 704 CRYPTO_get_lock_name(type), 705 file,line); 706 } 707 #endif 708 } 709 else 710 { 711 CRYPTO_lock(CRYPTO_LOCK|CRYPTO_WRITE,type,file,line); 712 713 ret= *pointer+amount; 714 #ifdef LOCK_DEBUG 715 { 716 CRYPTO_THREADID id; 717 CRYPTO_THREADID_current(&id); 718 fprintf(stderr,"ladd:%08lx:%2d+%2d->%2d %-18s %s:%d\n", 719 CRYPTO_THREADID_hash(&id), 720 *pointer,amount,ret, 721 CRYPTO_get_lock_name(type), 722 file,line); 723 } 724 #endif 725 *pointer=ret; 726 CRYPTO_lock(CRYPTO_UNLOCK|CRYPTO_WRITE,type,file,line); 727 } 728 return(ret); 729 } 730 731 const char *CRYPTO_get_lock_name(int type) 732 { 733 if (type < 0) 734 return("dynamic"); 735 else if (type < CRYPTO_NUM_LOCKS) 736 return(lock_names[type]); 737 else if (type-CRYPTO_NUM_LOCKS > sk_OPENSSL_STRING_num(app_locks)) 738 return("ERROR"); 739 else 740 return(sk_OPENSSL_STRING_value(app_locks,type-CRYPTO_NUM_LOCKS)); 741 } 742 743 #if defined(__i386) || defined(__i386__) || defined(_M_IX86) || \ 744 defined(__INTEL__) || \ 745 defined(__x86_64) || defined(__x86_64__) || defined(_M_AMD64) || defined(_M_X64) 746 747 unsigned int OPENSSL_ia32cap_P[2]; 748 unsigned long *OPENSSL_ia32cap_loc(void) 749 { if (sizeof(long)==4) 750 /* 751 * If 32-bit application pulls address of OPENSSL_ia32cap_P[0] 752 * clear second element to maintain the illusion that vector 753 * is 32-bit. 754 */ 755 OPENSSL_ia32cap_P[1]=0; 756 return (unsigned long *)OPENSSL_ia32cap_P; 757 } 758 759 #if defined(OPENSSL_CPUID_OBJ) && !defined(OPENSSL_NO_ASM) && !defined(I386_ONLY) 760 #define OPENSSL_CPUID_SETUP 761 #if defined(_WIN32) 762 typedef unsigned __int64 IA32CAP; 763 #else 764 typedef unsigned long long IA32CAP; 765 #endif 766 void OPENSSL_cpuid_setup(void) 767 { static int trigger=0; 768 IA32CAP OPENSSL_ia32_cpuid(void); 769 IA32CAP vec; 770 char *env; 771 772 if (trigger) return; 773 774 trigger=1; 775 if ((env=getenv("OPENSSL_ia32cap"))) { 776 int off = (env[0]=='~')?1:0; 777 #if defined(_WIN32) 778 if (!sscanf(env+off,"%I64i",&vec)) vec = strtoul(env+off,NULL,0); 779 #else 780 if (!sscanf(env+off,"%lli",(long long *)&vec)) vec = strtoul(env+off,NULL,0); 781 #endif 782 if (off) vec = OPENSSL_ia32_cpuid()&~vec; 783 } 784 else 785 vec = OPENSSL_ia32_cpuid(); 786 787 /* 788 * |(1<<10) sets a reserved bit to signal that variable 789 * was initialized already... This is to avoid interference 790 * with cpuid snippets in ELF .init segment. 791 */ 792 OPENSSL_ia32cap_P[0] = (unsigned int)vec|(1<<10); 793 OPENSSL_ia32cap_P[1] = (unsigned int)(vec>>32); 794 } 795 #endif 796 797 #else 798 unsigned long *OPENSSL_ia32cap_loc(void) { return NULL; } 799 #endif 800 int OPENSSL_NONPIC_relocated = 0; 801 #if !defined(OPENSSL_CPUID_SETUP) && !defined(OPENSSL_CPUID_OBJ) 802 void OPENSSL_cpuid_setup(void) {} 803 #endif 804 805 #if (defined(_WIN32) || defined(__CYGWIN__)) && defined(_WINDLL) 806 #ifdef __CYGWIN__ 807 /* pick DLL_[PROCESS|THREAD]_[ATTACH|DETACH] definitions */ 808 #include <windows.h> 809 /* this has side-effect of _WIN32 getting defined, which otherwise 810 * is mutually exclusive with __CYGWIN__... */ 811 #endif 812 813 /* All we really need to do is remove the 'error' state when a thread 814 * detaches */ 815 816 BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, 817 LPVOID lpvReserved) 818 { 819 switch(fdwReason) 820 { 821 case DLL_PROCESS_ATTACH: 822 OPENSSL_cpuid_setup(); 823 #if defined(_WIN32_WINNT) 824 { 825 IMAGE_DOS_HEADER *dos_header = (IMAGE_DOS_HEADER *)hinstDLL; 826 IMAGE_NT_HEADERS *nt_headers; 827 828 if (dos_header->e_magic==IMAGE_DOS_SIGNATURE) 829 { 830 nt_headers = (IMAGE_NT_HEADERS *)((char *)dos_header 831 + dos_header->e_lfanew); 832 if (nt_headers->Signature==IMAGE_NT_SIGNATURE && 833 hinstDLL!=(HINSTANCE)(nt_headers->OptionalHeader.ImageBase)) 834 OPENSSL_NONPIC_relocated=1; 835 } 836 } 837 #endif 838 break; 839 case DLL_THREAD_ATTACH: 840 break; 841 case DLL_THREAD_DETACH: 842 break; 843 case DLL_PROCESS_DETACH: 844 break; 845 } 846 return(TRUE); 847 } 848 #endif 849 850 #if defined(_WIN32) && !defined(__CYGWIN__) 851 #include <tchar.h> 852 #include <signal.h> 853 #ifdef __WATCOMC__ 854 #if defined(_UNICODE) || defined(__UNICODE__) 855 #define _vsntprintf _vsnwprintf 856 #else 857 #define _vsntprintf _vsnprintf 858 #endif 859 #endif 860 #ifdef _MSC_VER 861 #define alloca _alloca 862 #endif 863 864 #if defined(_WIN32_WINNT) && _WIN32_WINNT>=0x0333 865 int OPENSSL_isservice(void) 866 { HWINSTA h; 867 DWORD len; 868 WCHAR *name; 869 static union { void *p; int (*f)(void); } _OPENSSL_isservice = { NULL }; 870 871 if (_OPENSSL_isservice.p == NULL) { 872 HANDLE h = GetModuleHandle(NULL); 873 if (h != NULL) 874 _OPENSSL_isservice.p = GetProcAddress(h,"_OPENSSL_isservice"); 875 if (_OPENSSL_isservice.p == NULL) 876 _OPENSSL_isservice.p = (void *)-1; 877 } 878 879 if (_OPENSSL_isservice.p != (void *)-1) 880 return (*_OPENSSL_isservice.f)(); 881 882 (void)GetDesktopWindow(); /* return value is ignored */ 883 884 h = GetProcessWindowStation(); 885 if (h==NULL) return -1; 886 887 if (GetUserObjectInformationW (h,UOI_NAME,NULL,0,&len) || 888 GetLastError() != ERROR_INSUFFICIENT_BUFFER) 889 return -1; 890 891 if (len>512) return -1; /* paranoia */ 892 len++,len&=~1; /* paranoia */ 893 name=(WCHAR *)alloca(len+sizeof(WCHAR)); 894 if (!GetUserObjectInformationW (h,UOI_NAME,name,len,&len)) 895 return -1; 896 897 len++,len&=~1; /* paranoia */ 898 name[len/sizeof(WCHAR)]=L'\0'; /* paranoia */ 899 #if 1 900 /* This doesn't cover "interactive" services [working with real 901 * WinSta0's] nor programs started non-interactively by Task 902 * Scheduler [those are working with SAWinSta]. */ 903 if (wcsstr(name,L"Service-0x")) return 1; 904 #else 905 /* This covers all non-interactive programs such as services. */ 906 if (!wcsstr(name,L"WinSta0")) return 1; 907 #endif 908 else return 0; 909 } 910 #else 911 int OPENSSL_isservice(void) { return 0; } 912 #endif 913 914 void OPENSSL_showfatal (const char *fmta,...) 915 { va_list ap; 916 TCHAR buf[256]; 917 const TCHAR *fmt; 918 #ifdef STD_ERROR_HANDLE /* what a dirty trick! */ 919 HANDLE h; 920 921 if ((h=GetStdHandle(STD_ERROR_HANDLE)) != NULL && 922 GetFileType(h)!=FILE_TYPE_UNKNOWN) 923 { /* must be console application */ 924 va_start (ap,fmta); 925 vfprintf (stderr,fmta,ap); 926 va_end (ap); 927 return; 928 } 929 #endif 930 931 if (sizeof(TCHAR)==sizeof(char)) 932 fmt=(const TCHAR *)fmta; 933 else do 934 { int keepgoing; 935 size_t len_0=strlen(fmta)+1,i; 936 WCHAR *fmtw; 937 938 fmtw = (WCHAR *)alloca(len_0*sizeof(WCHAR)); 939 if (fmtw == NULL) { fmt=(const TCHAR *)L"no stack?"; break; } 940 941 #ifndef OPENSSL_NO_MULTIBYTE 942 if (!MultiByteToWideChar(CP_ACP,0,fmta,len_0,fmtw,len_0)) 943 #endif 944 for (i=0;i<len_0;i++) fmtw[i]=(WCHAR)fmta[i]; 945 946 for (i=0;i<len_0;i++) 947 { if (fmtw[i]==L'%') do 948 { keepgoing=0; 949 switch (fmtw[i+1]) 950 { case L'0': case L'1': case L'2': case L'3': case L'4': 951 case L'5': case L'6': case L'7': case L'8': case L'9': 952 case L'.': case L'*': 953 case L'-': i++; keepgoing=1; break; 954 case L's': fmtw[i+1]=L'S'; break; 955 case L'S': fmtw[i+1]=L's'; break; 956 case L'c': fmtw[i+1]=L'C'; break; 957 case L'C': fmtw[i+1]=L'c'; break; 958 } 959 } while (keepgoing); 960 } 961 fmt = (const TCHAR *)fmtw; 962 } while (0); 963 964 va_start (ap,fmta); 965 _vsntprintf (buf,sizeof(buf)/sizeof(TCHAR)-1,fmt,ap); 966 buf [sizeof(buf)/sizeof(TCHAR)-1] = _T('\0'); 967 va_end (ap); 968 969 #if defined(_WIN32_WINNT) && _WIN32_WINNT>=0x0333 970 /* this -------------v--- guards NT-specific calls */ 971 if (check_winnt() && OPENSSL_isservice() > 0) 972 { HANDLE h = RegisterEventSource(0,_T("OPENSSL")); 973 const TCHAR *pmsg=buf; 974 ReportEvent(h,EVENTLOG_ERROR_TYPE,0,0,0,1,0,&pmsg,0); 975 DeregisterEventSource(h); 976 } 977 else 978 #endif 979 MessageBox (NULL,buf,_T("OpenSSL: FATAL"),MB_OK|MB_ICONSTOP); 980 } 981 #else 982 void OPENSSL_showfatal (const char *fmta,...) 983 { va_list ap; 984 985 va_start (ap,fmta); 986 vfprintf (stderr,fmta,ap); 987 va_end (ap); 988 } 989 int OPENSSL_isservice (void) { return 0; } 990 #endif 991 992 void OpenSSLDie(const char *file,int line,const char *assertion) 993 { 994 OPENSSL_showfatal( 995 "%s(%d): OpenSSL internal error, assertion failed: %s\n", 996 file,line,assertion); 997 #if !defined(_WIN32) || defined(__CYGWIN__) 998 abort(); 999 #else 1000 /* Win32 abort() customarily shows a dialog, but we just did that... */ 1001 raise(SIGABRT); 1002 _exit(3); 1003 #endif 1004 } 1005 1006 void *OPENSSL_stderr(void) { return stderr; } 1007 1008 int CRYPTO_memcmp(const void *in_a, const void *in_b, size_t len) 1009 { 1010 size_t i; 1011 const unsigned char *a = in_a; 1012 const unsigned char *b = in_b; 1013 unsigned char x = 0; 1014 1015 for (i = 0; i < len; i++) 1016 x |= a[i] ^ b[i]; 1017 1018 return x; 1019 }